Liveness Check

This documentation provides detailed information on how to integrate QoreID’s Liveness Detection service through both API and SDK.

Introduction

QoreID’s Liveness Detection verifies that the person behind the camera is physically present and not a spoof, deepfake, or replay attack. This safeguards identity verification workflows by ensuring that only real human users—not images, masks, or pre-recorded footage—can pass the authentication process.

Our solution is designed for seamless integration, high security, and a smooth user experience. Whether used during onboarding or re-authentication, Liveness Detection strengthens trust and protects against fraud in real time.

Integrating Liveness Detection SDK

By integrating QoreID’s Liveness SDK into your application, you can detect biometric spoofing attempts instantly. This enhances both the security and accuracy of your user verification workflows. The SDK is lightweight, intuitive, and supported across multiple platforms. Below is a table showing the government-issued IDs supported by Liveness Check

For more information on our Liveness Detection SDK (click

S/NDigital ID Supported by FacematchSupported
1NIN
2Virtual NIN
3Drivers License
4Nigerian Passport
5Voters Card

Key Features

  1. Real-time Verification
    QoreID’s Liveness Detection performs instant, real-time evaluation of the user’s presence, enabling businesses to block fraudulent attempts the moment they occur.
  2. Multiple Detection Modalities
    Our solution uses several modalities—such as facial movement, eye blinking, and head rotation—to verify live human presence. This creates a high-confidence detection environment that is difficult for attackers to bypass.
  3. Advanced Anti Spoofing Algorithms
    Built on sophisticated machine-learning models, Liveness Detection can distinguish between real human motion and artificial attempts like printed photos, masks, deepfakes, or replayed videos.
  4. Seamless Integration with Other Technologies
    QoreID Liveness integrates effortlessly with face recognition, document verification, and other identity services to provide a unified, end-to-end identity verification solution. identity verification services
  5. Accessibility
    Our liveness technology can be accessed via both mobile and web SDKs, ensuring easy adoption across a wide range of applications and user environments.
  6. Multi-Platform Support
    QoreID Liveness works across various operating systems, mobile devices, and web applications, giving businesses maximum flexibility during implementation

Benefits

  1. Fraud Prevention
    Liveness Detection helps prevent impersonation by confirming that the user is physically present and alive. This blocks attempts involving stolen photos, printed IDs, screens, or synthetic identities.
  2. Increases Accuracy
    By validating that a live human is behind the camera, the system delivers significantly more accurate identity verification results, reducing false positives and false negatives.
  3. Enhances Security
    Liveness acts as an additional protective layer in your identity verification stack, ensuring that no verification is approved without real-time proof of presence.
  4. Improves User Experience
    The process is fast, intuitive, and requires minimal user interaction. This reduces onboarding friction and eliminates the need for slow manual reviews.
  5. Compliance with Regulations
    Liveness Detection supports regulatory requirements for secure onboarding across industries such as finance, fintech, telecommunications, and mobility. It strengthens the integrity of your KYC and authentication flows.

Use Case for Liveness Detection

1️⃣ Identity Fraud Prevention

Liveness Detection is a critical tool for combating identity fraud. By confirming that the user is truly present during verification, businesses can prevent unauthorized access, protect customer accounts, and reduce financial losses.

2️⃣Re-Authentication

QoreID’s re-authentication feature introduces an extra layer of protection by requiring users to confirm their identity again when performing sensitive actions—such as logging in on a new device or executing high-risk transactions.

This ensures that only the authorized user can access or modify their account, even if credentials are compromised.